skip to main content
10.1145/2482513.2482532acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Non-invertible and revocable iris templates using key-dependent wavelet transforms

Published:17 June 2013Publication History

ABSTRACT

A technique to generate non-invertible and revocable iris templates is proposed employing key-dependent wavelet transforms. In particular, parametrised wavelet-filters and wavelet packets are used in feature extraction in replacement of a pyramidal D4 wavelet transform. Since the template generation process is non-invertible by design, the overall scheme is non-invertible as well. Recognition accuracy is found to be high as long as personal tokens remain secret, templates can be revoked by simply exchanging the wavelet transform applied in the feature extraction process.

References

  1. R. Cappelli, A. Lumini, D. Maio, and D. Maltoni. Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9):1489--1503, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Cohen and N. Dyn. Nonstationary subdivisions schemes and multiresolution analysis. SIAM Journal of Mathematical Analysis, 27(6):1745--1769, Nov. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Dietl, P. Meerwald, and A. Uhl. Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies), 83(10):2095--2116, Oct. 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Engel, T. Stütz, and A. Uhl. Assessing JPEG2000 encryption with key-dependent wavelet packets. EURASIP Journal on Information Security, 2012(2), 2012.Google ScholarGoogle Scholar
  5. Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In I. Goldberg and M. Atallah, editors, Proceedings of Privacy Enhancing Technologies (PETS'09), volume 5672 of LNCS, pages 235--253. Springer Verlag, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Feng and A. Jain. Fingerprint reconstruction: From minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(2):209,223, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia. From the iriscode to the iris: A new vulnerability of iris recognition systems, 2012. Briefings-Talk at blackhat USA 2012, http://media.blackhat.com/bh-us-12/Briefings/Galbally/BH_US_12_Galbally_Iris_Reconstruction_WP.pdf.Google ScholarGoogle Scholar
  8. O. Gerek and A. Cetin. Polyphase adaptive filter banks for fingerprint image compression. Electronics Letters, 34:1931?--1932, Oct. 1998.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Gomez-Barrero, J. Galbally, P. Tome, and J. Fierrez. On the vulnerability of iris-based systems to a software attack based on a genetic algorithm. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, volume 7441 of Lecture Notes on Computer Science, pages 114--121, Berlin, Heidelberg, 2012. Springer-Verlag.Google ScholarGoogle Scholar
  10. M. Häfner, R. Kwitt, A. Uhl, A. Gangl, F. Wrba, and A. Vécsei. Computer-assisted pit-pattern classification in different wavelet domains for supporting dignity assessment of colonic polyps. Pattern Recognition, 42(6):1180--1191, Sept. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Hämmerle-Uhl, E. Pschernig, and A. Uhl. Cancelable iris-templates using key-dependent wavelet transforms. In Proceedings of the 6th IAPR/IEEE International Conference on Biometrics (ICB'13), Madrid, Spain, June 2013. To appear.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP Journal Adv. Signal Process, 2008:1--17, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Laimer and A. Uhl. Key dependent JPEG2000-based robust hashing for secure image authentication. EURASIP Journal on Information Security, Article ID 895174:doi:10.1155/2008/895174, 19 pages, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13(6):739--750, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Mühlbacher, T. Stütz, and A. Uhl. JPEG2000 Part 2 wavelet packet subband structures in fingerprint recognition. In P. Frossard, H. Li, F. Wu, B. Girod, S. Li, and G. Wei, editors, Visual Communications and Image Processing 2010 (VCIP'10), number 7744 in Proceedings of SPIE, pages 77442C'1--77442C'10, Huang Shan, China, July 2010. SPIE.Google ScholarGoogle Scholar
  16. N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614--634, Apr. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Rathgeb and A. Uhl. Attacking iris recognition: An effcient hill-climbing technique. In Proceedings of the 20th International Conference on Pattern Recognition (ICPR'10), pages 1217--1220, Istanbul, Turkey, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Rathgeb and A. Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011(3), 2011.Google ScholarGoogle Scholar
  19. C. Roberts. Biometric attack vectors and defenses. Computers & Security, 26:14--25, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Ross, J. Shah, and A. K. Jain. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):544--560, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Schneid and S. Pittner. On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing, 51:165--173, May 1993.Google ScholarGoogle ScholarCross RefCross Ref
  22. B. Sy. Secure computation for privacy preserving biometric data retrieval and authentication. In D. Ortiz-Arroyo et al., editors, Intelligence and Security Informatics, volume 5376 of LNCS, pages 143--154. Springer Verlag, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Venugopalan and M. Savvides. How to generate spoofed irises from an iris code template. IEEE Transactions of Information Forensics and Security, 6:385--394, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Wickerhauser. Adapted wavelet analysis from theory to software. A.K. Peters, Wellesley, Mass., 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. Zhu, T. Tan, and Y. Wang. Biometric personal identification based on iris patterns. In Proceedings of the 15th International Conference on Pattern Recognition (ICPR'00), volume 2, pages 2801--2804. IEEE Computer Society, 2000.Google ScholarGoogle Scholar
  26. H. Zou and A. H. Tewfik. Parametrization of compactly supported orthonormal wavelets. IEEE Transactions on Signal Processing, 41(3):1423--1431, Mar. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Non-invertible and revocable iris templates using key-dependent wavelet transforms

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
      June 2013
      242 pages
      ISBN:9781450320818
      DOI:10.1145/2482513

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 June 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '13 Paper Acceptance Rate27of74submissions,36%Overall Acceptance Rate128of318submissions,40%
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader